summaryrefslogtreecommitdiffstats
path: root/drivers/char/random.c
Commit message (Expand)AuthorAgeFilesLines
* random: remove rng_has_arch_random()Jason A. Donenfeld2022-06-101-13/+0
* random: do not use jump labels before they are initializedJason A. Donenfeld2022-06-101-1/+10
* random: account for arch randomness in bitsJason A. Donenfeld2022-06-101-5/+5
* random: mark bootloader randomness code as __initJason A. Donenfeld2022-06-101-4/+3
* random: avoid checking crng_ready() twice in random_init()Jason A. Donenfeld2022-06-101-1/+1
* random: check for signals after page of pool writesJason A. Donenfeld2022-05-221-4/+10
* random: wire up fops->splice_{read,write}_iter()Jens Axboe2022-05-201-0/+4
* random: convert to using fops->write_iter()Jens Axboe2022-05-201-32/+35
* random: convert to using fops->read_iter()Jens Axboe2022-05-201-36/+29
* random: unify batched entropy implementationsJason A. Donenfeld2022-05-191-92/+55
* random: move randomize_page() into mm where it belongsJason A. Donenfeld2022-05-191-32/+0
* random: remove mostly unused async readiness notifierJason A. Donenfeld2022-05-191-48/+0
* random: remove get_random_bytes_arch() and add rng_has_arch_random()Jason A. Donenfeld2022-05-191-33/+16
* random: move initialization functions out of hot pagesJason A. Donenfeld2022-05-191-25/+21
* random: make consistent use of buf and lenJason A. Donenfeld2022-05-191-102/+97
* random: use static branch for crng_ready()Jason A. Donenfeld2022-05-191-4/+12
* random: credit architectural init the exact amountJason A. Donenfeld2022-05-181-6/+6
* random: handle latent entropy and command line from random_init()Jason A. Donenfeld2022-05-181-7/+10
* random: use proper jiffies comparison macroJason A. Donenfeld2022-05-181-1/+1
* random: remove ratelimiting for in-kernel unseeded randomnessJason A. Donenfeld2022-05-181-44/+18
* random: move initialization out of reseeding hot pathJason A. Donenfeld2022-05-181-23/+19
* random: avoid initializing twice in credit raceJason A. Donenfeld2022-05-181-5/+5
* random: use symbolic constants for crng_init statesJason A. Donenfeld2022-05-181-19/+19
* siphash: use one source of truth for siphash permutationsJason A. Donenfeld2022-05-181-23/+7
* random: help compiler out with fast_mix() by using simpler argumentsJason A. Donenfeld2022-05-181-21/+23
* random: do not use input pool from hard IRQsJason A. Donenfeld2022-05-181-15/+36
* random: order timer entropy functions below interrupt functionsJason A. Donenfeld2022-05-161-119/+119
* random: do not pretend to handle premature next security modelJason A. Donenfeld2022-05-151-118/+68
* random: use first 128 bits of input as fast initJason A. Donenfeld2022-05-131-97/+49
* random: do not use batches when !crng_ready()Jason A. Donenfeld2022-05-131-3/+11
* random: mix in timestamps and reseed on system restoreJason A. Donenfeld2022-05-131-0/+30
* random: vary jitter iterations based on cycle counter speedJason A. Donenfeld2022-05-131-10/+26
* random: insist on random_get_entropy() existing in order to simplifyJason A. Donenfeld2022-05-131-60/+29
* random: document crng_fast_key_erasure() destination possibilityJason A. Donenfeld2022-04-251-1/+8
* random: use memmove instead of memcpy for remaining 32 bytesJason A. Donenfeld2022-04-161-1/+1
* random: make random_get_entropy() return an unsigned longJason A. Donenfeld2022-04-131-13/+7
* random: allow partial reads if later user copies failJason A. Donenfeld2022-04-131-10/+12
* random: check for signals every PAGE_SIZE chunk of /dev/[u]randomJason A. Donenfeld2022-04-071-10/+7
* random: check for signal_pending() outside of need_resched() checkJann Horn2022-04-061-2/+2
* random: do not allow user to keep crng key around on stackJason A. Donenfeld2022-04-061-12/+23
* random: opportunistically initialize on /dev/urandom readsJason A. Donenfeld2022-04-051-0/+7
* random: do not split fast init input in add_hwgenerator_randomness()Jan Varho2022-04-041-17/+6
* random: mix build-time latent entropy into pool at initJason A. Donenfeld2022-03-311-0/+5
* random: re-add removed comment about get_random_{u32,u64} reseedingJason A. Donenfeld2022-03-251-3/+4
* random: treat bootloader trust toggle the same way as cpu trust toggleJason A. Donenfeld2022-03-251-1/+7
* random: skip fast_init if hwrng provides large chunk of entropyJason A. Donenfeld2022-03-251-1/+1
* Revert "random: block in /dev/urandom"Linus Torvalds2022-03-221-17/+55
* Merge tag 'for-5.18/block-2022-03-18' of git://git.kernel.dk/linux-blockLinus Torvalds2022-03-211-1/+1
|\
| * block: remove genhd.hChristoph Hellwig2022-02-021-1/+1
* | random: check for signal and try earlier when generating entropyJason A. Donenfeld2022-03-121-2/+3